Security policy includes what you are securing - include assumptions (like physical security: "we assume that the building is secured against unauthorized entry").
"Attack surface" - lots or little ports listening, what they do, etc
Some switches revert to hubs when they get overloaded - switched networks aren't safer. (But we knew that already, ettercap.)
NSA has OS security guidelines on their site.
Sample intrusion policy for us:
Hard disk encryption
Problems with passphrases: sometimes they get truncated "silently"
-- MikePatterson - 27 Apr 2005